{"title":"A new approach on self-adaptive trust management for social Internet of Things","authors":"Elham Moeinaddini , Eslam Nazemi , Amin Shahraki","doi":"10.1016/j.comnet.2025.111187","DOIUrl":null,"url":null,"abstract":"<div><div>The emergence of the Social Internet of Things (SIoT) represents a significant evolution of the traditional Internet of Things (IoT) paradigm. While earlier IoT systems prioritized the integration of intelligent devices, the SIoT paradigm shifts the focus toward enabling social interaction and collaboration among connected entities. Within the SIoT, various nodes can autonomously establish social connections to access the desired services. Given the dynamic and decentralized nature of this open environment, effective trust management becomes crucial. In recent years, machine learning (ML) techniques have made significant progress in enhancing trust computing within the SIoT ecosystem. However, challenges such as scalability, dynamic behavior, and device resource limitations continue to pose difficulties. This study introduces SATM-SIoT, a decentralized self-adaptive trust management model for SIoT that integrates the MAPE-K (Monitor, Analyze, Plan, Execute, Knowledge) control loop. By adjusting thresholds based on perceived hostile behavior, this model effectively identifies malicious devices, enhancing adaptivity in trust management. To address resource limitations and ensure scalability, our model assigns trust evaluation tasks to Fog nodes, leveraging their distributed computational power. We utilize ML techniques, specifically multi-layer perceptron (MLP), to analyze device behavior and assess trustworthiness. Federated learning (FL) enhances local ML models, enabling collaborative learning and incremental updates based on new data to adapt to the dynamics of SIoT. The primary goal of SATM-SIoT is to improve overall trustworthiness and accurately detect malicious devices while tackling challenges related to scalability, dynamic behavior, and resource constraints. We conducted experiments on a simulated SIoT network to validate our model. The results show that SATM-SIoT effectively identifies almost all malicious devices in a SIoT network. Utilizing the FL technique and MAPE-K loop led to an average increase in Success Rate of 7% and 9%, respectively.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"263 ","pages":"Article 111187"},"PeriodicalIF":4.4000,"publicationDate":"2025-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1389128625001550","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0
Abstract
The emergence of the Social Internet of Things (SIoT) represents a significant evolution of the traditional Internet of Things (IoT) paradigm. While earlier IoT systems prioritized the integration of intelligent devices, the SIoT paradigm shifts the focus toward enabling social interaction and collaboration among connected entities. Within the SIoT, various nodes can autonomously establish social connections to access the desired services. Given the dynamic and decentralized nature of this open environment, effective trust management becomes crucial. In recent years, machine learning (ML) techniques have made significant progress in enhancing trust computing within the SIoT ecosystem. However, challenges such as scalability, dynamic behavior, and device resource limitations continue to pose difficulties. This study introduces SATM-SIoT, a decentralized self-adaptive trust management model for SIoT that integrates the MAPE-K (Monitor, Analyze, Plan, Execute, Knowledge) control loop. By adjusting thresholds based on perceived hostile behavior, this model effectively identifies malicious devices, enhancing adaptivity in trust management. To address resource limitations and ensure scalability, our model assigns trust evaluation tasks to Fog nodes, leveraging their distributed computational power. We utilize ML techniques, specifically multi-layer perceptron (MLP), to analyze device behavior and assess trustworthiness. Federated learning (FL) enhances local ML models, enabling collaborative learning and incremental updates based on new data to adapt to the dynamics of SIoT. The primary goal of SATM-SIoT is to improve overall trustworthiness and accurately detect malicious devices while tackling challenges related to scalability, dynamic behavior, and resource constraints. We conducted experiments on a simulated SIoT network to validate our model. The results show that SATM-SIoT effectively identifies almost all malicious devices in a SIoT network. Utilizing the FL technique and MAPE-K loop led to an average increase in Success Rate of 7% and 9%, respectively.
期刊介绍:
Computer Networks is an international, archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in the computer communications networking area. The audience includes researchers, managers and operators of networks as well as designers and implementors. The Editorial Board will consider any material for publication that is of interest to those groups.